Journal: J. Comput. Sci. Technol.

Volume 23, Issue 6

885 -- 894Jian Yu, Yanbo Han, Jun Han, Yan Jin, Paolo Falcarin, Maurizio Morisio. Synthesizing Service Composition Models on the Basis of Temporal Business Rules
895 -- 904Gang Huang, Lianshan Sun. An Access Control Framework for Reflective Middleware
905 -- 915Hua-Ming Liao, Guo-Shun Pei. Cache-Based Aggregate Query Shipping: An Efficient Scheme of Distributed OLAP Query Processing
916 -- 928Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, Tao Zhang. Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
929 -- 943Donggeon Noh, Heonshik Shin. URECA: Efficient Resource Location Middleware for Ubiquitous Environment
944 -- 956Xue Zhang, Jue Hong, Sanglu Lu, Li Xie, Jiannong Cao. Scoped Bellman-Ford Geographic Routing for Large Dynamic Wireless Sensor Networks
957 -- 972Yongxuan Lai, Yilong Chen, Hong Chen. PEJA: Progressive Energy-Efficient Join Processing for Sensor Networks
973 -- 987Hong Shen, Yu Zhang. Improved Approximate Detection of Duplicates for Data Streams Over Sliding Windows
988 -- 997Jianhua Feng, Guoliang Li, Na Ta. A Semantic Cache Framework for Secure XML Queries
998 -- 1014Nan Chen, Lidan Shou, Gang Chen, Jinxiang Dong. Adaptive Indexing of Moving Objects with Highly Variable Update Frequencies
1015 -- 1025Bai-Lin Yang, Frederick W. B. Li, Zhi-Geng Pan, Xun Wang. An Effective Error Resilient Packetization Scheme for Progressive Mesh Transmission over Unreliable Networks
1026 -- 1036Chandrajit L. Bajaj, Guoliang Xu, Qin Zhang. Higher-Order Level-Set Method and Its Application in Biomolecular Surfaces Construction
1037 -- 1046Da Wang, Yu Hu, Huawei Li, Xiaowei Li. Design-for-Testability Features and Test Implementation of a Giga Hertz General Purpose Microprocessor

Volume 23, Issue 5

694 -- 710Markus Hinkelmann, Andreas Jakoby, Peer Stechert. ::::t::::-Private and ::::t::::-Secure Auctions
711 -- 718Bing Yang, Jing Chen, Enyue Lu, Si-Qing Zheng. Design and Performance Evaluation of Sequence Partition Algorithms
719 -- 727Avraham Trakhtman. Some Aspects of Synchronization of DFA
728 -- 739Xuehou Tan, Bo Jiang. Searching a Polygonal Region by Two Guards
740 -- 748Wei-Lin Li, Peng Zhang, Da-Ming Zhu. On Constrained Facility Location Problems
749 -- 762Florian Diedrich, Rolf Harren, Klaus Jansen, Ralf Thöle, Henning Thomas. Approximation Algorithms for 3D Orthogonal Knapsack
763 -- 768Jianxin Wang, Xiaoshuang Xu, Jianer Chen. Approximation Algorithm Based on Chain Implication for Constrained Minimum Vertex Covers in Bipartite Graphs
769 -- 779Wei-Ming Wang, Ligang Dong, Bin Zhuge. Analysis and Implementation of an Open Programmable Router Based on Forwarding and Control Element Separation
780 -- 791Shaoliang Peng, Shanshan Li, Lei Chen 0002, Yuxing Peng, Nong Xiao. Scalable Base-Station Model-Based Multicast in Wireless Sensor Networks
792 -- 805Dong-nian Cheng, Yuxiang Hu, Cai-xia Liu. Parallel Algorithm Core: A Novel IPSec Algorithm Engine for Both Exploiting Parallelism and Improving Scalability
806 -- 814Lizhong Dai, Dongmei Zhao. Uplink Scheduling for Supporting Real Time Voice Traffic in IEEE 802.16 Backhaul Networks
815 -- 824Pisai Setthawong, Surat Tanterdtid. Flood Avoidance Mechanisms for Bridged Resilient Packet Rings
825 -- 831Jun-Wu Dong, Dingyi Pei, Xue-Li Wang. A Class of Key Predistribution Schemes Based on Orthogonal Arrays
832 -- 842Haibo Tian, Willy Susilo, Yang Ming, Yu-Min Wang. A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles
843 -- 850Zhixiong Chen, Shengqiang Li. Some Notes on Generalized Cyclotomic Sequences of Length ::::pq::::
851 -- 861Murat Ekinci, Murat Aykut. Palmprint Recognition by Applying Wavelet-Based Kernel PCA
862 -- 873Gang Xu, Guo-Zhao Wang, Xiao-Diao Chen. Free-Form Deformation with Rational DMS-Spline Volumes
874 -- 884Kangwoo Lee. Guiding Attention by Cooperative Cues

Volume 23, Issue 4

481 -- 496Haixun Wang, Jian Pei. Clustering by Pattern Similarity
497 -- 515Lu-An Tang, Bin Cui, Hong-Yan Li, Gaoshan Miao, Dongqing Yang, Xinbiao Zhou. PGG: An Online Pattern Based Approach for Stream Variation Management
516 -- 537Byron Choi, Gao Cong, Wenfei Fan, Stratis Viglas. Updating Recursive XML Views of Relations
538 -- 556Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu, Lei Chen 0002, Xiaoyang Sean Wang, Xuemin Lin. Continually Answering Constraint ::::k:::: - ::::NN:::: Queries in Unstructured P2P Systems
557 -- 572Xian Zhang, Yu Hao, Xiaoyan Zhu, Ming Li. New Information Distance Measure and Its Application in Question Answering System
573 -- 581Loris Nanni, Alessandra Lumini. Cluster-Based Nearest-Neighbour Classifier and Its Application on the Lightning Classification
582 -- 589Xiaoyong Fang, Zhigang Luo, Zheng-Hua Wang. Predicting RNA Secondary Structure Using Profile Stochastic Context-Free Grammars and Phylogenic Analysis
590 -- 601Hao Lang, Bin Wang, Gareth J. F. Jones, Jin-Tao Li, Fan Ding, Yi-Xuan Liu. Query Performance Prediction for Information Retrieval Based on Covering Topic Score
602 -- 611Xu Sun, Houfeng Wang, Bo Wang. Predicting Chinese Abbreviations from Definitions: An Empirical Learning Approach Using Support Vector Regression
612 -- 619Hai Zhao, Chunyu Kit. Scaling Conditional Random Fields by One-Against-the-Other Decomposition
620 -- 632Wei-Wu Hu, Jian Wang. Making Effective Decisions in Computer Architects Real-World: Lessons and Experiences with Godson-2 Processor Designs
633 -- 643Qiong Zou, Xiao-Feng Li, Long-Bing Zhang. Runtime Engine for Dynamic Profile Guided Stride Prefetching
644 -- 651Ji-Gang Wu, Thambipillai Srikanthan, Guang-Wei Zou. New Model and Algorithm for Hardware/Software Partitioning
652 -- 659Tiziana Calamoneri, Saverio Caminiti, Rossella Petreschi. A General Approach to ::::L:::: ( ::::h, k:::: )-Label Interconnection Networks
660 -- 671Renyi Xiao. Survey on Anonymity in Unstructured Peer-to-Peer Systems
672 -- 683Nan Du, Bai Wang, Bin Wu. Community Detection in Complex Networks
684 -- 693Youjian Zhao, Zuhui Yue, Jian-Ping Wu. Research on Next-Generation Scalable Routers Implemented with H-Torus Topology

Volume 23, Issue 3

305 -- 326Miaomiao Wang, Jiannong Cao, Jing Li, Sajal K. Das. Middleware for Wireless Sensor Networks: A Survey
327 -- 342Jie Wu, Shuhui Yang. SmallWorld Model-Based Polylogarithmic Routing Using Mobile Nodes
343 -- 354Vaishali P. Sadaphal, Bijendra N. Jain. Random and Periodic Sleep Schedules for Target Detection in Sensor Networks
355 -- 364Xiao-Lin Li, Jiannong Cao. Coordinated Workload Scheduling in Hierarchical Sensor Networks for Data Fusion Applications
365 -- 376Kan Cai, Michael J. Feeley, Brendan Cully, Sharath J. George. Understanding Performance for Two 802.11 Competing Flows
377 -- 388Fereshteh Amini, Moazzam Khan, Jelena V. Misic, Hossein Pourreza. Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange
389 -- 399Vasileios Karyotis, Anastasios Kakalis, Symeon Papavassiliou. Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis
400 -- 412Michele Garetto, Marco Gribaudo, Carla-Fabiana Chiasserini, Emilio Leonardi. Sensor Deployment and Relocation: A Unified Scheme
413 -- 425Chittabrata Ghosh, Bin Xie, Dharma P. Agrawal. ROPAS: Cross-Layer Cognitive Architecture for Mobile UWB Networks
426 -- 437Feng Lu, Liang-Tien Chia, Kok-Leong Tay, Wai-Hoe Chong. NBgossip: An Energy-Efficient Gossip Algorithm for Wireless Sensor Networks
438 -- 450Juan A. Sánchez, Rafael Marín-Pérez, Pedro M. Ruiz. Beacon-Less Geographic Routing in Real Wireless Sensor Networks
451 -- 460François Ingelrest, David Simplot-Ryl. Maximizing the Delivery of MPR Broadcasting Under Realistic Physical Layer Assumptions
461 -- 480Jaime Lloret, Miguel Garcia, Jesús Tomás, Fernando Boronat. GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks

Volume 23, Issue 2

165 -- 0Sheng Zhong, Rui Xue. Preface
166 -- 175Rui Xue, Ninghui Li, Jiangtao Li. Algebraic Construction for Zero-Knowledge Sets
176 -- 187Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki. WWW Business Applications Based on the Cellular Model
188 -- 202Grigorios Loukides, Jianhua Shao. An Efficient Clustering Algorithm for ::::k:::: -Anonymisation
203 -- 213Chun-Lin Xin, Wei-Min Ma, Lei Yang. Competitive Analysis of Two Special Online Device Replacement Problems
214 -- 221Baodong Qin, Ming Li, Fanyu Kong. Cryptanalysis of a Type of CRT-Based RSA Algorithms
222 -- 230Jibao Lai, Huiqiang Wang, Xiaowu Liu, Ying Liang, Ruijuan Zheng, Guo-sheng Zhao. WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization
231 -- 239Bo Chen, Hui He, Jun Guo. Constructing Maximum Entropy Language Models for Movie Review Subjectivity Analysis
240 -- 252Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao. Generic Transformation from Weakly to Strongly Unforgeable Signatures
253 -- 264Chia-Chi Wu, Chin-Chen Chang, Iuon-Chang Lin. New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency
265 -- 269Shengli Liu, Xiaofeng Chen, Fang-Guo Zhang. Forgeability of Wang-Tang-Li s ID-Based Restrictive Partially Blind Signature Scheme
270 -- 279Yanli Liu, Jin Wang, Xi Chen, Yanwen Guo, Qunsheng Peng. A Robust and Fast Non-Local Means Algorithm for Image Denoising
280 -- 289Yueh-Yi Lai, Wen-Kai Tai. Transition Texture Synthesis
290 -- 297Jia Li, Liyong Shen, Xiao-Shan Gao. Proper Reparametrization of Rational Ruled Surface
298 -- 305Zusong Li, Dandan Huan, Wei-Wu Hu, Zhi-Min Tang. Chip Multithreaded Consistency Model

Volume 23, Issue 1

1 -- 0Xiao-Dong Li, Wenjian Luo, Xin Yao. Preface
2 -- 18Xiaomin Hu, Jun Zhang, Yun Li. Orthogonal Methods Based Ant Colony Search for Solving Continuous Optimization Problems
19 -- 34Ehab Z. Elfeky, Ruhul A. Sarker, Daryl Essam. Analyzing the Simple Ranking and Selection Process for Constrained Evolutionary Optimization
35 -- 43Nan Ding, Shude Zhou, Zengqi Sun. Histogram-Based Estimation of Distribution Algorithm: A Competent Method for Continuous Optimization
44 -- 63Lam Thu Bui, Kalyanmoy Deb, Hussein A. Abbass, Daryl Essam. Interleaving Guidance in Evolutionary Multi-Objective Optimization
64 -- 76Grant Dick, Peter A. Whigham. Spatially-Structured Sharing Technique for Multimodal Problems
77 -- 102Daniel Kunkle, Donghui Zhang, Gene Cooperman. Mining Frequent Generalized Itemsets and Generalized Association Rules Without Redundancy
103 -- 111Zhenhua Huang, Jiankui Guo, Sheng-Li Sun, Wei Wang. Efficient Optimization of Multiple Subspace Skyline Queries
112 -- 128Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu. Clustering Text Data Streams
129 -- 140Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai. Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment
141 -- 153Han-Xin Sun, Kun-Peng Yang, Yulai Zhao, Dong Tong, Xu Cheng. CASA: A New IFU Architecture for Power-Efficient Instruction Cache and TLB Designs
154 -- 165Cheng-Dong Jiang, Guo-Liang Chen. Double Barrier Coverage in Dense Sensor Networks